Detecting host location attacks in SDN-based networks

Sonali Sen Baidya, Rattikorn Hewett

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Software Defined Networking (SDN) is an emerging technology that has increasingly become popular for implementing modern infrastructures. SDN offers advantages of programmable and flexible network management over the traditional practice. As more and more SDN-based networks are being implemented, it is necessary to consider security issues especially those that are inherent from SDN. This paper addresses an important SDN specific security issue, namely a host location (tracking) attack, where an attacker compromises a host and captures its location information to manipulate the packets and trick the controller. Such an attack can potentially lead to many harmful effects including disruption of network traffic and denial of services. In particular, we introduce a new host location attack that exploits unused ports, along with its countermeasure for the controller to detect and take appropriate actions. We illustrate and evaluate the proposed detection mechanism by network simulations. The results obtained from our experiments are effective and promising.

Original languageEnglish
Title of host publication2020 29th Wireless and Optical Communications Conference, WOCC 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728161242
DOIs
StatePublished - May 2020
Event29th Wireless and Optical Communications Conference, WOCC 2020 - Newark, United States
Duration: May 1 2020May 2 2020

Publication series

Name2020 29th Wireless and Optical Communications Conference, WOCC 2020

Conference

Conference29th Wireless and Optical Communications Conference, WOCC 2020
Country/TerritoryUnited States
CityNewark
Period05/1/2005/2/20

Keywords

  • SDN security
  • Software-Defined Networking
  • host discovery
  • host hijacking attacks

Fingerprint

Dive into the research topics of 'Detecting host location attacks in SDN-based networks'. Together they form a unique fingerprint.

Cite this